Enhancing the data privacy for public data lakes

Author(s):  
Yi-Hua Chen ◽  
Hsin-Hsin Chen ◽  
Po-Chun Huang
Keyword(s):  
2021 ◽  
Author(s):  
A. K. JAITHUNBI ◽  
S. SABENA ◽  
L. SAIRAMESH

Abstract Today’s internet world is moves to cloud computing to maintain their public data privately in a secure way. In cloud scenario, many security principles are implemented to maintain the secure transmission of data over the internet. And still, the main concern is about maintaining the integrity of our own data in public cloud. Mostly, research works concentrates on cryptographic techniques for secure sharing of data but there is no such mentioned works are available for data integrity. In this paper, a data masking technique called obfuscation is implemented which is used to protect the data from unwanted modification by data breaching attacks. In this work, enhanced Vigenere encryption is used to perform obfuscation that maintains the privacy of the user’s data. Enhanced Vigenere encryption algorithm combined with intelligent rules to maintain the dissimilarity between the data masking for perform encryption with different set of rules. This work mainly concentrates on data privacy with reduced time complexity for encryption and decryption.


2022 ◽  
Vol 6 (GROUP) ◽  
pp. 1-13
Author(s):  
Jessica Pater ◽  
Casey Fiesler ◽  
Michael Zimmer

Many research communities routinely conduct activities that fall outside the bounds of traditional human subjects research, yet still frequently rely on the determinations of institutional review boards (IRBs) or similar regulatory bodies to scope ethical decision-making. Presented as a U.S. university-based fictional memo describing a post-hoc IRB review of a research study about social media and public health, this design fiction draws inspiration from current debates and uncertainties in the HCI and social computing communities around issues such as the use of public data, privacy, open science, and unintended consequences, in order to highlight the limitations of regulatory bodies as arbiters of ethics and the importance of forward-thinking ethical considerations from researchers and research communities.


Information ◽  
2020 ◽  
Vol 11 (9) ◽  
pp. 409
Author(s):  
Yuan Ping ◽  
Yu Zhan ◽  
Ke Lu ◽  
Baocang Wang

Although cloud storage provides convenient data outsourcing services, an untrusted cloud server frequently threatens the integrity and security of the outsourced data. Therefore, it is extremely urgent to design security schemes allowing the users to check the integrity of data with acceptable computational and communication overheads. In this paper, we first propose a public data integrity verification scheme based on the algebraic signature and elliptic curve cryptography. This scheme not only allows the third party authority deputize for users to verify the outsourced data integrity, but also resists malicious attacks such as replay attacks, replacing attack and forgery attacks. Data privacy is guaranteed by symmetric encryption. Furthermore, we construct a novel data structure named divide and conquer hash list, which can efficiently perform data updating operations, such as deletion, insertion, and modification. Compared with the relevant schemes in the literature, security analysis and performance evaluations show that the proposed scheme gains some advantages in integrity verification and dynamic updating.


Author(s):  
Saumya Gupta, Et. al.

Bigdata becomes a significant sector and academics research topic. Bigdata is a two-edged sword. The rising volume of information together will increase the likelihood of blundering non-public data privacy. Due to many new technologies and innovations that pervade our everyday lives, like smartphones and social networking apps, and the Internet of Things-based intelligent-world systems, the large amount of data generated in our world has exploded. During this data processing, storage, and the use of the information it can quickly cause personal information exposure and the difficulty of interpreting the information. The aim is to incorporate this range of information into one framework for big data management and to recognize problems regarding privacy. This paper begins with the introduction of bigdata, its process, protection issues, and tools which are used to solve its problems


Author(s):  
P. Sudheer ◽  
T. Lakshmi Surekha

Cloud computing is a revolutionary computing paradigm, which enables flexible, on-demand, and low-cost usage of computing resources, but the data is outsourced to some cloud servers, and various privacy concerns emerge from it. Various schemes based on the attribute-based encryption have been to secure the cloud storage. Data content privacy. A semi anonymous privilege control scheme AnonyControl to address not only the data privacy. But also the user identity privacy. AnonyControl decentralizes the central authority to limit the identity leakage and thus achieves semi anonymity. The  Anonymity –F which fully prevent the identity leakage and achieve the full anonymity.


2019 ◽  
Vol 84 (764) ◽  
pp. 2165-2174
Author(s):  
Yuki AKIYAMA ◽  
Akihiro UEDA ◽  
Kenta OUCHI ◽  
Natsuki ITO ◽  
Yoshiya ONO ◽  
...  

2018 ◽  
Vol 10 (1) ◽  
pp. 19-26 ◽  
Author(s):  
Muhammad Iqbal Perkasa ◽  
Eko Budi Setiawan

Data is one of the most important things in this information and information technology era that evolving now. Currently, the government still has not used the public data maximally for administrative purposes. Utilization of this big population data is the creation of a web service application system with REST API where this data will be open and accessible to those who have access. One of the institutions that use this service is the Manpower and Transmigration Service where this system can make the Dinas staff more efficient to create and register job search cards using available community data. This application is able to provide and facilitate many parties, such as data administrators to monitor data usage, registration employee in input data, and people able to register independently. Index Terms—Web service, API, Rest api, People data


Sign in / Sign up

Export Citation Format

Share Document